Academic literature on the topic 'Information technology – Ethiopia – Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information technology – Ethiopia – Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information technology – Ethiopia – Management"

1

Okello Jared, Otieno, Stephen Migiro, and Emmanuel Mutambara. "Integrated Financial Management Information System: a conceptual framework for Migori County, Kenya." Public and Municipal Finance 6, no. 1 (April 5, 2017): 37–45. http://dx.doi.org/10.21511/pmf.06(1).2017.04.

Full text
Abstract:
In the modern world, developing countries like Kenya, Tanzania, Ethiopia and several others in the African continent have been encouraged to reform their public expenditure management systems through computerization of the entire public sectors in response to the increasing volume of data or information that need to be processed. There are, however, various factors to be considered prior to the implementation of the public expenditure management information systems. This paper undertakes a theoretical review of the critical success factors that impact on the implementation of an Integrated Financial Management Information System (IFMIS) with a view to identify factors applicable to the Migori County of Kenya. The paper, then, identifies the key factors to be incorporated in the proposed IFMS framework. The proposed framework draws from the Technology Acceptance Model (TAM), Innovation Diffusion Theory (IDT) and the Work Around Theory (WAT). The paper fuses these theories towards a successful adoption of use of modern technology within the public sector IFMS. The key factors include technical, organizational, environmental, cultural and ethical behavior. These factors could improve efficiency and transparency through direct payments to suppliers and contractors, reduced prices due to gains based on the time value of money, as well as the comparative analysis of market rates and advanced relations across the numerous organizational units within government on execution, reporting, and thoroughness of budget transactions.
APA, Harvard, Vancouver, ISO, and other styles
2

Gagliardone, Iginio. "The Socialization of ICTs in Ethiopia." International Journal of Sociotechnology and Knowledge Development 1, no. 4 (October 2009): 13–28. http://dx.doi.org/10.4018/jskd.2009062602.

Full text
Abstract:
This paper addresses how state actors in the developing world have influenced technology adoption and favoured the diffusion of certain uses of ICTs while discouraging others. Drawing upon extensive field research and looking at the evolution of ICTs in Ethiopia, it examines how a semi-authoritarian, yet developmentally oriented regime, has actively sought to mediate the – either real or imagined – destabilising aspects of ICTs while embracing them as a tool for nation-building. A constructivist framework as developed in international relations and history of technology is employed to understand how the introduction of the new ICT framework as promoted by international organizations has been mediated both by the results of the socialization of earlier technologies in Ethiopia and by the national project pursued by the local political elite.
APA, Harvard, Vancouver, ISO, and other styles
3

Alemu, Teshome, Tridib Bandyopadhyay, and Solomon Negash. "Electronic Payment Adoption in the Banking Sector of Low-Income Countries." International Journal of Information Systems in the Service Sector 7, no. 4 (October 2015): 27–47. http://dx.doi.org/10.4018/ijisss.2015100102.

Full text
Abstract:
Banks in low-income countries are launching e-banking services such as Internet banking, SMS banking, ATM banking, card banking, point of sales (PoS) and mobile banking. Among these planned services, ATM is the most matured service in many private and state owned banks in Ethiopia. ATM is a recent phenomenon in low-income countries (; ), and is still being introduced in financial sectors in low-income countries (Angeli, 2008; ) making investigation of factors of ICT technology adoption in low income countries timely. The authors test context specific applicability of UTAUT (Unified Theory of Acceptance and Use of Technology) model. The authors' analysis of primary data suggests general applicability of the modified UTAUT model in explaining factors and antecedents of technology adoption but also identifies significant differences in the moderating factors of gender and age. Depending on whether they are above or below the age of 30, Ethiopian consumers of banking services exhibit highly differentiated levels of service credibility and technology risk acceptance towards ATM banking. This suggests that banking services sector in low income countries may like to clearly delineate and appropriately differentiate their awareness and reach-out strategies to their customers who belong to one or the other age group. Furthermore, women in this study are found to perceive themselves as more susceptible to fraud and other security risks in ATM banking, suggesting that special design considerations be incorporated in the way locations of ATMs are selected and in the way ATM technology features are accessed to ally such fears. The authors' work also shows research directions where other scholars may investigate an otherwise much diffused technology adoption in the low income countries of the world.
APA, Harvard, Vancouver, ISO, and other styles
4

Berihun, Getamesay Biyadgilign, and Dereje Teferi. "Developing an Improved ITSM Framework for Ethio Telecom." Journal of Information Systems and Informatics 3, no. 2 (June 25, 2021): 433–55. http://dx.doi.org/10.33557/journalisi.v3i2.145.

Full text
Abstract:
Telecom service providers are engaged exhaustively in providing various kinds of IT services for their customers. These IT services should be customer-oriented, and quality-based to be competitive in the market. To this end, organizations should manage their IT services effectively and efficiently by introducing various Information Technology Service Management (ITSM) mechanisms. However, improving or developing optimal ITSM mechanisms is a subject of great concern that needs further investigation academically. To the best of the researcher’s knowledge, little or no research has been conducted to design and develop ITSM frameworks for the telecom sector in Ethiopia. Previous studies focused on the implementation, adoption, tailoring, and system or model development for selected ITSM processes within the Ethiopian context. Ethio telecom (ET), the sole telecom service provider of Ethiopia, has a gap in the existing ITSM practices. Hence, this research study intends to investigate the current ITSM practice of Ethio telecom and propose an ITSM framework based on ITIL best practices that ensures the quality of IT services and improve customer satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
5

Muriithi, Beatrice W., Nancy G. Gathogo, Gracious M. Diiro, Samira A. Mohamed, and Sunday Ekesi. "Potential Adoption of Integrated Pest Management Strategy for Suppression of Mango Fruit Flies in East Africa: An Ex Ante and Ex Post Analysis in Ethiopia and Kenya." Agriculture 10, no. 7 (July 8, 2020): 278. http://dx.doi.org/10.3390/agriculture10070278.

Full text
Abstract:
To sustain agricultural development in Africa, innovative strategies for addressing a myriad of biotic and abiotic constraints facing the agricultural systems must be established. One current biotic stress is the mango infesting fruit flies. In the effort to contain the widely spreading and damaging invasive species of tephritid fruit fly (Bactrocera dorsalis) (Hendel), an area-wide integrated pest management (IPM) program is being promoted in the horticultural sub-sector in sub-Saharan Africa. Such a new technology in which farmers have limited information before commercialization may have diffusion paths that are different from the often-assumed sigmoid (or “s”) shaped curve. We apply the descriptive and econometric analysis of ex ante and ex post integrated fruit fly management used by mango farmers in Kenya and Ethiopia. The results reveal that this technology has a relatively high adoption rate and high prospects for adoption growth in Kenya compared to Ethiopia in the near future.
APA, Harvard, Vancouver, ISO, and other styles
6

Gezahegn, Tafesse W., and Xueqin Zhu. "Marginal value of natural water in agriculture: a study in the suburbs of Mekelle City, Ethiopia." Water Policy 17, no. 2 (August 11, 2014): 316–31. http://dx.doi.org/10.2166/wp.2014.146.

Full text
Abstract:
In areas where markets for natural water are lacking, information on its marginal value can be an important tool for proper pricing to achieve efficient allocation of the resource. This article investigates the marginal value of natural water (rainwater used as a proxy) in agricultural crop production in the suburbs of Mekelle City, Ethiopia, by econometrically estimating individual value functions for three selected crops: wheat, barley, and teff (a staple food crop in Ethiopia). Results show that, on average, an additional 0.30 birr (birr = Ethiopian currency: 1 euro ≈ 23 birr) worth of output is generated for each extra cubic meter of rainwater used. This result provides the marginal value (shadow price) of water in crop production at a certain point of the water cycle. It thus provides useful policy information for efficiently pricing water resources based on full-cost recovery, implying that the current tap water prices should be increased at least by 0.30 birr/m3 if the scarcity value of natural water is to be accounted for. The marginal value of natural water turned out to be the highest in teff production, suggesting that producing this crop would be the most water-efficient decision in the area.
APA, Harvard, Vancouver, ISO, and other styles
7

Kifle, Mengistu, Fay Cobb Payton, Victor Mbarika, and Peter Meso. "Transfer and Adoption of Advanced Information Technology Solutions in Resource-Poor Environments: The Case of Telemedicine Systems Adoption in Ethiopia." Telemedicine and e-Health 16, no. 3 (April 2010): 327–43. http://dx.doi.org/10.1089/tmj.2009.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fikre, Seyfe. "The Role and Challenge of Ethiopian Commodity Exchange (ECX) on Coffee Supplies and Marketing in Ethiopia." Business and Management Studies 6, no. 3 (September 8, 2020): 1. http://dx.doi.org/10.11114/bms.v6i3.4976.

Full text
Abstract:
The objective of the study was to examine the role and challenge of ECX in coffee supply by measuring the core function ECX. The study used primary data collected from 120 respondents and analyzed through descriptive statistics and multiple linear regression. The study used six core function of ECX i.e. market information, enabling competition, market development, price discovery, and storage and grading and facilitation of physical commodity to measure the role and challenge of ECX. The results of the descriptive statistics showed that among ECX‘s core function, facilitation of physical commodity trade service was given the highest score while the storage and grading service was given the least score by the respondents. The multiple linear regression result indicate that three independent variable (Market information, market development and facilitation of physical commodity trade) were found to be significantly and positively influence the coffee supply and performance. Facilitation of physical commodity trade was significant at 1% while market information and market development were significant at 10%. Even though ECX have contributed to coffee supply and marketing performance, it is not free from a problem. The challenge are associated with service delivery system like grading system to test the quality of coffee was not uniform and biasedness one client from the other and wastage of time to test and low quality grading widely observed. ECX experts also indicate that absence of skilled man power, low government attention and capital shortage also another challenge in coffee marketing and supply. ECX should improve the service of storage and grading by introducing new technology and by maintaining transparent service. ECX should also build better warehouse management system in order to avoid wastage and quality deterioration.
APA, Harvard, Vancouver, ISO, and other styles
9

Haile, Mekbib G., Tesfamicheal Wossen, and Matthias Kalkuhl. "Access to information, price expectations and welfare: The role of mobile phone adoption in Ethiopia." Technological Forecasting and Social Change 145 (August 2019): 82–92. http://dx.doi.org/10.1016/j.techfore.2019.04.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kassahun, Teshome. "Adoption of garden coffee production technology package by smallholder farmers in Ethiopia." African Journal of Food, Agriculture, Nutrition and Development 21, no. 05 (July 6, 2021): 17989–8004. http://dx.doi.org/10.18697/ajfand.100.19990.

Full text
Abstract:
This study investigated the level and determinants of garden coffee production technology package adoption in Ethiopia. The analysis was based on survey data collected from 293 garden coffee-growing households. The findings show that garden coffee production technology package adoption status in Dale districts was various across the smallholders’ growers. The productivity of improved coffee varieties at farm plots was less than at research plots in Dale due to low coffee production technology package adoption. The use of improved coffee varieties, weed control practices, compost application, pruning practices, shade tree management, intercropping practices, and coffee seedling planting spacingisthe main garden coffee production technology package practiced by smallholder coffee growersinDale. Thus, the garden coffee production technology package adoption index score ranged from 0.43 to 1.00. Adoption index scores were categorized into high (0.71 to 1), medium (0.5 to 0.7) and Low (0.43 to 0.49) adopters. Only 57% of farmers reached high coffee production technology adoption status but the remaining30% and 13% of garden coffee farmers attained medium and low adoption status. The mean adoption index score was found to be 0.66, which implies the overall adoption status was found under the medium technology adoption category. The maximum likelihood estimates of Tobit model result shows that gender of household head (-0.261), education level (0.09),the annual income of the household (0.003), farm size (0.031), availability of labor (0.155), credit facilities (0.087), coffee extension services (0.047) and farmer perception of improved coffee varieties (-0.024) were significant determinants of garden coffee production technology package in Dale district. Hence, for farmers to adopt new technology they must know it well. Adopting all components of the coffee production technology package simultaneously as recommended by the research center enhances coffee productivity at farm plots level. Moreover, building better coffee production extension services, institutional arrangement, and access to new technology information can possibly increase coffee production technology package adoption in Ethiopia.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information technology – Ethiopia – Management"

1

Adem, Lishan. "The impact of information technology in sub Saharan Africa with a particular reference to Ethiopia : a constructionist approach." Thesis, University of Sheffield, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
APA, Harvard, Vancouver, ISO, and other styles
3

De, Jongh Henk. "Information technology outsourcing." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
APA, Harvard, Vancouver, ISO, and other styles
4

Duffy, Juliet (Juliet Maria). "Information management using Web 2.0 technology." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/50100.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Chemical Engineering; in conjunction with the Leaders for Manufacturing Program at MIT, 2009.
Includes bibliographical references.
Web 2.0, the ultimate platform for tacit based knowledge work has finally arrived. User driven, collaborative platform based tools including wikis, web mash-ups, discussion boards, linkage based search engines, and tagging have the potential to vastly change how information is managed and how knowledge work is captured. This thesis investigates how the new paradigms and tools of Web 2.0 can be applied to the Pharmaceutical Industry and assist with information management at The Novartis Institute for BioMedical Research (NIBR). Applying Web 2.0 tools to NIBR's chemical compounds, targets, assays, people, and projects in a well thought out framework has the potential to yield tremendous productivity improvements in the drug discovery process. Effectively harnessing the collective intelligence of thousands of scientists within Novartis's worldwide research network will enable a paradigm shift. A large, extremely knowledgeable user community can more effectively annotate metadata, hyperlink to important content, establish tags, and collectively author content. Such activities will not only improve the search ability of information but also allow important scientific connections to emerge linking biology to chemistry and furthering Novartis's understanding of disease.
by Juliet Duffy.
S.M.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
5

Tessema, Ermyas Arega. "The relation between ICT and poverty reduction : the Central Statistical Agency of Ethiopia." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5275.

Full text
Abstract:
Thesis (MPhil (Information Science))--University of Stellenbosch, 2010.
ENGLISH ABSTRACT: National Statistical offices (NSOs) are the sources of wide ranges of socio-economic, demographic and agricultural data and information that are used to monitor and evaluate development programs and formulate policies. The data generated by NSOs is used as basis for making decisions and also used to assess the extent and causes of poverty. Various stakeholders such as researchers, the World Bank, the International Monetary Fund, the UN, and various NGOs prepare and release research materials and annual reports using data and information obtained from NSOs and line ministries. For example, Deneulin and Shahani state that one of the intentions of the annual Human Development Report (HDR) prepared by the UNDP is “to assess the quality of life of a population and be an advocacy tool for its improvement with a political purpose of raising awareness and generating debate on public issues and concerns which would otherwise not be on the political agenda”1. Based on the different approaches to poverty, different sets of data and information are produced and used for poverty measurement. Mostly, poverty is measured using data obtained from nationally representative household surveys which focus on income and expenditure, ownership, access to and use of some basic services. Another approach uses data on mental satisfaction; still others assume poverty to be multi-dimensional and argue that income alone is not enough. They view poverty as deprivation of basic capabilities due to high rates of mortality, illiteracy, malnourishment, unemployment, ill health, lack of education and social exclusion, etc2. The quality of data and information (such as integrity, methodological soundness, accuracy and reliability, serviceability and accessibility) generated by data-producingagencies therefore needs to be preserved and improved in order to obtain meaningful results from the measurement of poverty in any of the approaches and to satisfy the growing data quality demands of stakeholders. Loshin states that “strategic decisions based on untrustworthy information are likely to result in poor decisions”3. This study focuses on the role played by national statistical offices in poverty reduction in general. It examines the various activities, players, interactions, and ICTs used at the various stages of the statistical process in the Ethiopian Central Statistical Agency (CSA) to generate poverty-related data and information and how the quality of this data can be preserved and improved. The purpose of this research is therefore to identify poverty related data quality problems with respect to the IMF’s DQAF and assess where in the statistical process specific types of ICTs can improve data quality. For this reason interpretive case study method with the researcher as participant observer was adopted to study how poverty related data and information is produced. It was found out that some of the data quality problems can be addressed using appropriate ICTs with the availability of reliable power infrastructures.
AFRIKAANSE OPSOMMING: Nasionale Statistiekkantore (NSOs) is die bron van ‘n wye reeks sosio-ekonomiese, demografiese en landboukundige data en inligting wat gebruik word om ontwikkelingsprogramme te monitor en te evalueer. Die data wat deur NSOs geskep word, word aangewend as grondslag vir besluitneming. Die data word ook gebruik om die omvang en oorsake van armoede te bepaal. Verskeie betrokkenes soos navorsers, die Wêreldbank (WB), Internasionale Monetêre Fonds (IMF) en die VN en NSOs skep en versprei verskillende navorsingsuitsette en jaarverslae wat gebruik maak van die data en inligting wat verkry word van NSOs en ministeries. So konstateer Deneulin en Shahani dat een van die doelstellings van die Verslag op Menslike Ontwikkeling (HDR), soos opgestel deur die VNDP, is om “die lewensgehalte van ‘n bevolking te skat en om as werktuig en voorspraak vir die verbetering daarvan op te tree, met die politiese doelwit om bewustheid te verhoog en debatvoering oor openbare sake en kwessies, wat andersins nie op die agenda sou verskyn nie, aan te voor”.4. Na gelang van die verskillende benaderings tot armoede word verskillende stelle data en inligting geproduseer en gebruik vir die meting van armoede. Armoede word gewoonlik gemeet deur data te gebruik wat bekom word van landswye opnames van huishoudings en ingestel is op inkomste en besteding, besitreg, toegang tot en die gebruik van ‘n paar basiese dienste. ‘n Ander benadering gebruik data oor geestelike bevrediging; ander weer aanvaar dat armoede multidimensioneel is en voer aan dat inkomste alleen nie genoeg is nie. Hulle beskou armoede as die ontbering van basiese vermoëns weens ‘n hoë sterftesyfer, ongeletterdheid, ondervoeding, siekte, gebrekkige onderwys, sosiale uitsluiting en dies meer5. Die gehalte van data en inligting (soos integriteit, metodologiese deeglikheid, akkuraatheid en betroubaarheid, bruikbaarheid en toeganklikheid) wat deur agentskappe opgelewer word moet dus bewaar en verbeter word ten einde ‘n beduidende resultaat te bekom uit die meting van armoede deur enige van die benaderings en ook om belanghebbendes se groeiende aandrang op datagehalte te bevredig. Loshin beweer dat “strategiese besluite gebaseer op onbetroubare inligting waarskynlik swak besluitneming tot gevolg sal hê”.6. Hierdie ondersoek konsentreer op die rol wat gespeel word deur nasionale statistiekkantore in die algemene bekamping van armoede. Dit ondersoek die verskillende aktiwiteite, rolspelers, interaksies en ICTs wat op verskeie stadiums van die statistiese proses deur die Etiopiese Sentrale Statistiekagentskap (CSA) gebruik word om data en inligting oor armoede te skep en hoe die betroubaarheid van data behou en verbeter kan word. Die doel van hierdie navorsing is dus om kwaliteitsprobleme wat verband hou met armoededata ten opsigte van die IMF se DQAF te identifiseer en om te besluit waar in die statistiese proses bepaalde soort ICT’s die gehalte van data kan identifiseer. Om hierdie rede is die interpretiewe gevallestudiemetode aanvaar om te bepaal hoe armoede-verwante data en inligting geskep word. Die slotsom was dat sommige van die probleme in datagehalte aangespreek kan word deur die gebruik van gepaste ICT’s met die beskikbaarheid van betroubare mag-infrakstrukture.
APA, Harvard, Vancouver, ISO, and other styles
6

Sezgin, Emre. "Itmem - Information Technology Management Enhancement Model: Assessment Of Information Technology Use In Organizations." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612353/index.pdf.

Full text
Abstract:
This study proposes a new model for the assessment of information technology (IT) use in public and private companies, which is called ITMEM- Information Technology Management Enhancement Model. This model aims to assist decision making processes in information technology management. For this purpose, a tool is developed to explore strengths and weaknesses of a company in IT use. The model was developed upon a three-folded structure including (1) academic studies in technology management, (2) best practices which are developed for control over operations and processes including COBIT, CMMI and ITIL, and (3) standards about IT management and IT security. The conceptual framework of ITMEM is based on technology management process assessment model of M.J. Gregory. Methodological triangulation approach is adopted for the model for retrieving valid and reliable results. Triangulation consists of (1) semi structured interview, (2) presented company documents and (3) questionnaire developed upon relevant academic researches, best practices and standards. ITMEM was practiced on ten domestic and experienced companies in software &
development and manufacturing industries which were appraised in or in progress of being appraised in CMMI. The study revealed the benefits and deficiencies of IT use in the company. It also provided information for decision makers about IT value within companies, and demonstrated the effects of best practices and standards over IT use.The reported findings should be valuable assets to researchers studying on IT management and IT use in organizations.
APA, Harvard, Vancouver, ISO, and other styles
7

McGee, Mary Jane. "Information Technology Management Strategies to Implement Knowledge Management Systems." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4156.

Full text
Abstract:
More than 38% of the U.S. public workforce will likely retire by 2030, which may result in a labor shortage. Business leaders may adopt strategies to mitigate knowledge loss within their organizations by capturing knowledge in a knowledge management system (KMS). The purpose of this single case study was to explore strategies that information technology (IT) managers use to develop and implement a KMS. The target population consisted of IT managers in a small-sized organization located in northwestern Florida who had implemented a KMS successfully. The conceptual framework for this study was organizational knowledge creation theory. The collection of public documents, execution of semistructured interviews with 5 qualified participants, literature on the topic, and member checking formed the determination of the findings of the study. Using triangulation and coding the data for emergent themes, 6 themes emerged from the data analysis: (a) training, (b) customer focus, (c) policy and governance, (d) leadership and management support, (e) communication and marketing, and (f) business process management. The application of the findings may contribute to social change by identifying strategies that leaders and IT managers from communities and government agencies use in implementing a KMS that may facilitate transparency and open flow of information to citizens, and allow access to timely, civic, and potentially life-enhancing information.
APA, Harvard, Vancouver, ISO, and other styles
8

Aral, Sinan. "Essays on information, technology and information worker productivity." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39003.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2007.
Includes bibliographical references.
I examine how information technology (IT) skills and use, communication network structures, and the distribution and flow of information in organizations impact individual information worker productivity. The work is divided into three essays based on the task level practices of information workers at a midsize executive recruiting firm: Essay 1: "Information, Technology and Information Worker Productivity: Task Level Evidence." I develop and econometrically test a multistage model of production and interaction activities at the firm, and analyze correlations among network structure, characteristics of information flow and real economic output. I find that (a) IT use is positively correlated with non-linear drivers of productivity; (b) the structure and size of workers' communication networks are highly correlated with performance; (c) an inverted-U shaped relationship exists between multitasking and productivity such that, beyond an optimum, more multitasking is associated with declining project completion rates and revenue generation; and (d) asynchronous information seeking such as email and database use promotes multitasking while synchronous information seeking over the phone shows a negative correlation. These data demonstrate a strong correspondence among technology use, social networks, and productivity for project-based information workers.
(cont.) Essay 2: "Network Structure and Information Advantage: Structural Determinants of Access to Novel Information and their Performance Implications." I examine relationships between social network structure, information structure, and individual performance. I build and validate a Vector Space Model of information diversity, develop hypotheses linking two key aspects of network structure - size and diversity - to the distribution of novel information among actors, and test the theory using data on email communication patterns, message content and performance. Results indicate that access to diverse, novel information is related to network structure in non-linear ways, and that network diversity contributes to performance even when controlling for the positive performance effects of access to novel information, suggesting additional benefits to network diversity beyond those conferred through information advantage.
(cont.) Essay 3: "Organizational Information Dynamics: Drivers of Information Diffusion in Organizations." I examine drivers of the diffusion of different types of information through organizations by observing several thousand diffusion processes of two types of information -'event news' and 'discussion topics' - from their original first use to their varied recipients over time. I then test the effects of network structure and functional and demographic characteristics of dyadic relationships on the likelihood of receiving each type of information and receiving it sooner. Discussion topics exhibit more shallow diffusion characterized by 'back-and-forth' conversation and are more likely to diffuse vertically up and down the organizational hierarchy, across relationships with a prior working history, and across stronger ties; while news, characterized by a spike in communication and rapid, pervasive diffusion through the organization, is more likely to diffuse laterally as well as vertically, and without regard to the strength or function of relationships. The findings highlight the importance of simultaneous considerations of structure and content in information diffusion studies.
by Sinan Aral.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
9

Kuan, Chan Hong. "Management of information technology for competitive advantage." Thesis, University of Macau, 1996. http://umaclib3.umac.mo/record=b1636729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Man-fai, and 鄭文輝. "Utitlization in information technology in housing management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B4500920X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information technology – Ethiopia – Management"

1

Chartered Institute of Management Accountants. Information technology management. London: Financial Training, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1945-, Bhaskar Krish, Housden R. J. W, and Chartered Institute of Management Accountants., eds. Information technology management. 2nd ed. Oxford: Butterworth Heinemann, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhaskar, Krish. Information technology management. 2nd ed. Oxford: Heinemann in association with the Chartered Institute of Management Accountants, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Burton, Paul F., and J. Howard Petrie. Information Management Technology. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Donna, Hussain, ed. Information technology management. Oxford [England]: Butterworth-Heinemann, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

W, Housden R. J., ed. Information technology management. 2nd ed. Oxford: Heinemann Professional Pub., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fawcett, Phillip. Management of information technology. London: Chartered Institute of Bankers, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwalbe, Kathy. Information technology project management. 5th ed. Boston, Mass: Thomson/Course Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cats-Baril, William L. Information technology and management. Chicago: Irwin, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Information management and technology. Washington, D.C: U.S. General Accounting Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information technology – Ethiopia – Management"

1

Day, David W. J. "Information Technology." In Project Management and Control, 134–52. London: Macmillan Education UK, 1994. http://dx.doi.org/10.1007/978-1-349-12097-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tarvin, Patrick. "Information Technology." In Leadership & Management of Machining, 77–84. München: Carl Hanser Verlag GmbH & Co. KG, 2016. http://dx.doi.org/10.3139/9781569906408.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Angell, Ian O., and Steve Smithson. "Information technology and information systems." In Information Systems Management, 77–93. London: Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21555-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Franklin, J. Rod. "Information Technology." In Operations, Logistics and Supply Chain Management, 165–90. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Paass, Gerhard, Daniel Schneider, and Stefan Wrobel. "Information and knowledge management." In Technology Guide, 276–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-88546-7_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Castillo, Francisco. "IT Portfolio Management." In Managing Information Technology, 211–27. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38891-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bacon, C. James. "Why companies invest in information technology." In Information management, 31–47. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-3208-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Burton, Paul F., and J. Howard Petrie. "Electronics for microcomputers." In Information Management Technology, 1–13. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Burton, Paul F., and J. Howard Petrie. "Implementation and system management." In Information Management Technology, 175–85. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burton, Paul F., and J. Howard Petrie. "Microcomputers: the building blocks." In Information Management Technology, 14–57. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information technology – Ethiopia – Management"

1

Gelagay, Habtamu Sewnet. "Geospatial Data Sharing Barriers Across Organizations and the Possible Solution for Ethiopia." In 4th International Conference on Geographical Information Systems Theory, Applications and Management. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006778802690273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fanta, Getnet Bogale, Leon Pretorius, and Louwrence Erasmus. "Hospitals' Readiness to Implement Sustainable SmartCare Systems in Addis Ababa, Ethiopia." In 2019 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2019. http://dx.doi.org/10.23919/picmet.2019.8893824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Accelerating Health Service and Data Capturing Trough Community Health Workers in Rural Ethiopia - A Pre-requisite to Progress." In International Conference on Knowledge Management and Information Sharing. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004135101680177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tesfaye Ayehu, Getachew. "Land capability mapping with SPOT data and geo-information technology south Gondar, North-Western highlands of Ethiopia." In 2013 Second International Conference on Agro-Geoinformatics. IEEE, 2013. http://dx.doi.org/10.1109/argo-geoinformatics.2013.6621917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

M. Duggal, Sudesh. "Global Information Technology Management." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2470.

Full text
Abstract:
Globalization is the perception of the world as one big market place. The notion of the boundariless world is expected to produce dramatic changes in key markets, major competitors, and Information Technology products. As a result, organizations are encouraged to rise above the national boundaries and change their orientation to global corporations. Further, the increased spending in Global Information Technology, which is anticipated to grow several folds within the next five years, is adding fuel to this shift. Events such as economic integration of Europe, merging of the companies across national borders, stock exchanges, outsourcing of Information Technology services to the third world countries, and the use of World Wide Web are forcing companies to re-evaluate their Global Information Technology management and to develop Global Information Strategy so as to get the most out of their business in the world economy. As the scope of Global Information Technology spans the global market, it is going to present mangers with a host of thorny issues. This paper suggests the key issues to be used as a guide for the Global Information Technology Managers to be successful in this fast changing technology oriented market, and also recommends Global Managers Evaluation Wheel which can be used for the appraisal of managers, subordinates, peer managers, on-site supervisors and clients working in the global Information Technology environment.
APA, Harvard, Vancouver, ISO, and other styles
6

"Information technology and management." In 2013 5th Conference on Information and Knowledge Technology (IKT). IEEE, 2013. http://dx.doi.org/10.1109/ikt.2013.6620128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Galup, Stuart, Jim J. Quan, Ronald Dattero, and Sue Conger. "Information technology service management." In the 2007 ACM SIGMIS CPR conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1235000.1235010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chhajed, Garvit, Hitesh Jethani, Anagha Pokharkar, Himanshu Bhutani, and Sadhika Jain. "SECURE CRYPTOGRAPHY KEY MANAGEMENT SYSTEM FOR WEB BASED WALLET MANAGEMENT SYSTEM." In ETHICS AND INFORMATION TECHNOLOGY. VOLKSON PRESS, 2020. http://dx.doi.org/10.26480/etit.02.2020.96.98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Klempa, Mathew J. "Management of information technology innovation." In the 1993 conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/158011.158120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malika, Frimeche. "Knowledge management and information technology." In 2014 4th International Symposium ISKO-Maghreb: Concepts and Tools for knowledge Management (ISKO-Maghreb). IEEE, 2014. http://dx.doi.org/10.1109/isko-maghreb.2014.7033479.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information technology – Ethiopia – Management"

1

Bartoszek, Thomas, Barry Gay, John Huddleston, James Mitchell, Alejandra Rodriguez, Vicky Sain, Christopher Scrabis, and Kathryn Truex. Information Technology Management: Management of Information Technology Resources Within DoD. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada432557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kraynova, O. S. Management of information technology enterprises. Ljournal, 2011. http://dx.doi.org/10.18411/kray-2011-mong-00071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pratt, Jerry, Jeffrey M. Bradshaw, James Allen, Lucian Galescu, and Niranjan Suri. Naval Automation and Information Management Technology. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada444049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pollock, Neal. Knowledge Management and Information Technology (Know-IT Encyclopedia). Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada407692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Widing, M. A., D. W. Blodgett, M. D. Braun, M. J. Jusko, J. M. Keisler, R. J. Love, and G. L. Robinson. DOE technology information management system database study report. Office of Scientific and Technical Information (OSTI), November 1994. http://dx.doi.org/10.2172/161564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Allen, James D. Information Technology Program Management: Is There a Difference? Fort Belvoir, VA: Defense Technical Information Center, June 2014. http://dx.doi.org/10.21236/ada607694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Sarah, James Mitchell, Kevin A. Palmer, Liyang Riggins, Kathryn Truex, and Zachary Williams. Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada432754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hughes, M. J., and P. K. S. Lau. Lockheed Martin Idaho Technologies Company information management technology architecture. Office of Scientific and Technical Information (OSTI), May 1996. http://dx.doi.org/10.2172/423618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Spetka, Scott E., George O. Ramseyer, and Richard W. Linderman. Grid Technology and Information Management for Command and Control. Fort Belvoir, VA: Defense Technical Information Center, June 2005. http://dx.doi.org/10.21236/ada464154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography